2024
DOI: 10.1080/17538947.2024.2302577
|View full text |Cite
|
Sign up to set email alerts
|

Deep object segmentation and classification networks for building damage detection using the xBD dataset

Zongze Zhao,
Fenglei Wang,
Shiyu Chen
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Binary features (7,12,14,20,21,22) describe attributes with two states, while categorical features (2, 3, 4, 42) reflect qualitative variables with distinct categories. Discrete features (8,9,15,(23)(24)(25)(26)(27)(28)(29)(30)(31)(32)(33)(34)(35)(36)(37)(38)(39)(40)(41)43) are unique numeric variables, but continuous features (1,5,6,10,11,13,16,17,18,19) can take any real value within a range. The dataset's 'attack' label has 40 labels, categorizing attacks as revised, U2R, DoS, R2L, and probing.…”
Section: Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…Binary features (7,12,14,20,21,22) describe attributes with two states, while categorical features (2, 3, 4, 42) reflect qualitative variables with distinct categories. Discrete features (8,9,15,(23)(24)(25)(26)(27)(28)(29)(30)(31)(32)(33)(34)(35)(36)(37)(38)(39)(40)(41)43) are unique numeric variables, but continuous features (1,5,6,10,11,13,16,17,18,19) can take any real value within a range. The dataset's 'attack' label has 40 labels, categorizing attacks as revised, U2R, DoS, R2L, and probing.…”
Section: Datasetmentioning
confidence: 99%
“…Moreover, the ECA mechanism is becoming increasingly popular in deep CNNs, especially in scenarios where there is a need for lightweight models that can deliver high performance. ECA surpasses conventional attention modules such as SE [41] and CBAM [41] by disregarding the necessity for dimensionality reduction and emphasizing local cross-channel interactions. Within the framework of an intrusion detection system that utilizes the NSL-KDD dataset, including ECA is proven to be an indispensable element.…”
Section: Utilization Of the Nsl-kdd Dataset For Intrusion Detectionmentioning
confidence: 99%